메뉴 건너뛰기




Volumn 9, Issue , 2004, Pages 105-114

Resolving constraint conflicts

Author keywords

Access control models; Constraint models; Policy design

Indexed keywords

AUTOMATION; COMPUTER OPERATING SYSTEMS; CONSTRAINT THEORY; HIERARCHICAL SYSTEMS; INFORMATION MANAGEMENT; MATHEMATICAL MODELS; PROBLEM SOLVING; PUBLIC POLICY;

EID: 4143132099     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/990036.990053     Document Type: Conference Paper
Times cited : (28)

References (23)
  • 3
    • 0003400257 scopus 로고
    • Secure computer systems: Mathematical foundations (volume 1)
    • ESD-TR-73-278
    • D. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations (Volume 1). Mitre Technical Report, ESD-TR-73-278, 1973.
    • (1973) Mitre Technical Report
    • Bell, D.1    Lapadula, L.2
  • 5
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Mitre Corporation, Mitre Corp, Bedford MA, June
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June 1975.
    • (1975) Technical Report , vol.MTR-3153
    • Biba, K.J.1
  • 16
    • 84862396738 scopus 로고    scopus 로고
    • July
    • LinuxSecurity.com Advisories. www.linuxsecurity.com/advisories/ turbolinux_advisory-587.html, July 2000.
    • (2000) LinuxSecurity.com Advisories


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.